Wavetrend L-RX100 Access control system
Technical Specification
- Make: Wavetrend
- Model code: L-RX100
- Series: Link-it Series
- No/ Type of Inputs/ Outputs: 2 x RJ45
- Operating Temperature oC: -10 ~ +60
The Link-it™ RFID Receiver detects and decodes RF transmitted signals from Tags. Interpreted data is converted into electrical information that is passed down the Reader-net (Network of readers). Each Receiver in a Link-it™ Active Tagging System is programmed with a unique Receiver address. Receivers can be used in stand-alone mode or in a multi-drop asynchronous network. Mounting the Receiver depends on the type of application. The standard method is fixed screw mounting.
Read more| Make | Wavetrend |
|---|---|
| Manufacturer | Wavetrend Ltd |
| Category | Access Control>Access control systems & kits |
| Model code | L-RX100 |
| Series | Link-it Series |
| No/ Type of Inputs/ Outputs | 2 x RJ45 |
| Environmental Specifications | Operating Temperature oC: -10 ~ +60 |
| Electrical Specifications | Voltage: 8.5 ~ 13.6 |
| Physical Specifications | Dimensions mm: 84 x 40 x 19 |
| Accessories | Asset Tag Reader |
| Additional info | The Link-it™ RFID Receiver detects and decodes RF transmitted signals from Tags. Interpreted data is converted into electrical information that is passed down the Reader-net (Network of readers). Each Receiver in a Link-it™ Active Tagging System is programmed with a unique Receiver address. Receivers can be used in stand-alone mode or in a multi-drop asynchronous network. Mounting the Receiver depends on the type of application. The standard method is fixed screw mounting. |
You might be interested in these products
- See other Wavetrend products
- Wavetrend Access control cards/ tags/ fobs
- Wavetrend Access control readers
- Wavetrend Access control software
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
